Conditional Entropy for Deception Analysis, 13th ICCRTS: C2 for Complex Endeavors
Rowe, Neil C.
MetadataShow full item record
This paper describes how basic concepts from information theory can be used to analyze deception. We show how a general definition of deception can be mapped to a simple communication model known as a Z-channel, and we show that any deception has associated with it a closely related deception we call it’s symmetric complement. These ideas allow computation of a specific form of conditional entropy which indicates the average uncertainty, in bits, that a deception imposes on a deception target. This uncertainty provides unique and general insight into a deceptions performance, and also indicates the general counter-deception potential available to a deception target. We then describe two deception-based mechanisms for computer security: the fake honeypot serves to inoculate a computer against intrusions; and the spoofing channel provides a safe and effective means for responding to in-progress computer intrusions. The spoofing channel is of fundamental interest because it is a deception equal to its symmetric complement.
13th International Command and Control Research and Technology Symposium (ICCRTS), June 17-19, 2008, Seattle, WA.International Command and Control Research and Technology Symposium, Bellevue, WA, June 2008.
Showing items related by title, author, creator and subject.
Rowe, Neil C.; Custy, E. John (2007);Cyberspace, computers and networks, is now potential terrain of warfare. We describe some effective forms of deception in cyberspace, and discuss how these deceptions are used in attacks. After a general assessment of ...
Monroe, James D. (Monterey, California. Naval Postgraduate School, 2012-06);This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a ...
Lutz, Kevin D. (Monterey, CA; Naval Postgraduate School, 2021-03);Political leaders, military leaders, and the general public gather information from images and video to make decisions. Media can be spread instantaneously throughout the world at low cost and anonymously using social ...